• Title/Summary/Keyword: detection mechanism

Search Result 850, Processing Time 0.022 seconds

Intelligent Internal Stealthy Attack and its Countermeasure for Multicast Routing Protocol in MANET

  • Arthur, Menaka Pushpa;Kannan, Kathiravan
    • ETRI Journal
    • /
    • v.37 no.6
    • /
    • pp.1108-1119
    • /
    • 2015
  • Multicast communication of mobile ad hoc networks is vulnerable to internal attacks due to its routing structure and high scalability of its participants. Though existing intrusion detection systems (IDSs) act smartly to defend against attack strategies, adversaries also accordingly update their attacking plans intelligently so as to intervene in successful defending schemes. In our work, we present a novel indirect internal stealthy attack on a tree-based multicast routing protocol. Such an indirect stealthy attack intelligently makes neighbor nodes drop their routing-layer unicast control packets instead of processing or forwarding them. The adversary targets the collision avoidance mechanism of the Medium Access Control (MAC) protocol to indirectly affect the routing layer process. Simulation results show the success of this attacking strategy over the existing "stealthy attack in wireless ad hoc networks: detection and countermeasure (SADEC)" detection system. We design a cross-layer automata-based stealthy attack on multicast routing protocols (SAMRP) attacker detection system to identify and isolate the proposed attacker. NS-2 simulation and analytical results show the efficient performance, against an indirect internal stealthy attack, of SAMRP over the existing SADEC and BLM attacker detection systems.

Hacking Detection Mechanism of Cyber Attacks Modeling (외부 해킹 탐지를 위한 사이버 공격 모델링)

  • Cheon, Yang-Ha
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.8 no.9
    • /
    • pp.1313-1318
    • /
    • 2013
  • In order to actively respond to cyber attacks, not only the security systems such as IDS, IPS, and Firewalls, but also ESM, a system that detects cyber attacks by analyzing various log data, are preferably deployed. However, as the attacks be come more elaborate and advanced, existing signature-based detection methods start to face their limitations. In response to that, researches upon symptom detection technology based on attack modeling by employing big-data analysis technology are actively on-going. This symptom detection technology is effective when it can accurately extract features of attacks and manipulate them to successfully execute the attack modeling. We propose the ways to extract attack features which can play a role as the basis of the modeling and detect intelligent threats by carrying out scenario-based modeling.

A Distributed Communication Model and Performance Evaluation for Information Transfer in a Security Policy-based Intrusion Detection System (보안정책 기반 침입탐지시스템에서 정보 전달을 위한 분산 통신 모델과 성능 평가)

  • Jang Jung Sook;Jeon Yong Hee;Jang Jong Soo;Sohn Seung Won
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.12C
    • /
    • pp.1707-1721
    • /
    • 2004
  • In this paper, we propose a distributed communication model of intrusion detection system(IDS) in which integrated security management at networks level is possible, model it at a security node and distributed system levels, design and implement a simulator. At the node level, we evaluate the transfer capability of alert message based on the analysis of giga-bit security node architecture which performs hardware-based intrusion detection. At the distributed system level, we perform the evaluation of transfer capability of detection and alert informations between components of distributed IDS. In the proposed model, we carry out the performance evaluation considering decision factors of communication mechanism and present the results in order to gain some quantitative understanding of the system.

Design and Analysis of Real-time Intrusion Detection Model for Distributed Environment (분산환경을 위한 실시간 침입 탐지 모델의 설계)

  • 이문구;전문석
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.9 no.1
    • /
    • pp.71-84
    • /
    • 1999
  • The most of intrusion detection methods do not detect intrusion when it happens. To solve the problem, we are studying a real-time intrusion detection. Because a previous intrusion detection system(IDS) is running on the host level, it difficult to port and to extend to other system on the network level that distributed environment. Also IDS provides the confidentiality of messages when it sends each other. This paper proposes a model of real-time intrusion detection using agents. It applies to distributed environment using an extensibility and communication mechanism among agents, supports a portability, an extensibility and a confidentiality of IDS.

A study on the Corrosion Detection Sensor using Multi-Wall Carbon Nanotube (다중벽 탄소나노튜브를 이용한 철근 부식 검출 센서 제작 연구)

  • Park, Soobin;Kim, Sungyeon;Lee, Sujeong;Choi, Munjeong;Hong, Yeongjun;Kwon, Sungjun;Yoo, Bongyoung;Yoon, Sanghwa
    • Journal of the Korean institute of surface engineering
    • /
    • v.54 no.4
    • /
    • pp.194-199
    • /
    • 2021
  • In this study, rebar corrosion detection sensor was fabricated using multi-walled carbon nanotubes (MWCNTs). MWCNTs were pre-treated in the acid electrolytes to attach the carboxylic acid to the surface of MWCNTs. The fabricated sensor was attached on the surface of rebar and it detected the corrosion of steel using LCR meter with variation of capacitance. The surface morphology and electrical properties were characterized using scanning electron microscope (SEM) and electrical test equipment, respectively. To verify the corrosion detection characteristics, comparison experiment using plastic bar was performed. Moreover, mechanism of corrosion detection sensor was discussed.

Analysis of Cutting Mechanism by Image Processing on Micro-Cutting in SEM (전자현미경내 마이크로 절삭의 화상처리에 의한 절삭 기구 해석)

  • 허성중
    • Transactions of the Korean Society of Machine Tool Engineers
    • /
    • v.12 no.3
    • /
    • pp.89-95
    • /
    • 2003
  • This research analyzes the cutting mechanism of A1100-H18 of commercially pure aluminum by image processing in SEM(Scanning Electron Microscope) for the measurement of strain rate distribution near a cutting edge in orthogonal micro-cutting. The distribution is measured using various methods in order. The methods are in-situ observations of cutting process in SEM, inputting image data, a computer image processing, calculating displacements by SSDA(Sequential Similarity Detection Algorithm) and calculating strain rates by FEM. The min results obtained are as follows: (1)It enables to measure a microscopic displacement near a cutting edge. (2) An application of this system to cutting process of various materials will help to make cutting mechanism clear.

Titanium Complexes: A Possible Catalyst for Controlled Radical Polymerization

  • Kwark, Young-Je;Kim, Jeong-Han;Novak Bruce M.
    • Macromolecular Research
    • /
    • v.15 no.1
    • /
    • pp.31-38
    • /
    • 2007
  • Pentamethylcyclopentadienyltitanium trichloride, bis(cyclopentadienyl)titanium dichloride ($Cp_2TiCl_2$), and bis(pentamethylcyclopentadienyl)titanium dichloride were used in the polymerization of styrene without the aid of Group I-III cocatalysts. The properties of the resulting polymer indicated that polymerization was more controlled than in thermal polymerization. The kinetic studies indicated that a lower level of termination is present and that the polymer chain can be extended by adding an additional monomer. To elucidate the mechanism of polymerization, a series of experiments was performed. All results supported the involvement of a radical mechanism in the polymerization using $Cp_2TiCl_2$. The possibility of atom transfer radical polymerization (ATRP) mechanism was investigated by isolating the intermediate species. We could confirm the activation step from the reaction of 1-PEC1 with $Cp_2TiCl$ by detecting the coupling product of the generated active radicals. However, the reversible deactivation reaction competes with other side reactions, and it detection was difficult with our model system.

Design of a Feeding Mechanism for Longitudinal Banknote Counters (길이방향 지폐계수기 투입구의 최적 설계)

  • Yoon, Jun-Ill;Kim, Kwon-Hee
    • Proceedings of the KSME Conference
    • /
    • 2001.11a
    • /
    • pp.848-852
    • /
    • 2001
  • A new approach to the design of bank note counters is suggested. Modern bank note counters are equipped with several types of sensors for counting and detection of counterfeit bank notes. To achieve higher speed of counting while maintaining the sensing capability, longitudinal feeding scheme is proposed. Several merits of longitudinal feeding are discussed. Taguchi method is used for the optimization of the feeding mechanism.

  • PDF

Distributed Prevention Mechanism for Network Partitioning in Wireless Sensor Networks

  • Wang, Lili;Wu, Xiaobei
    • Journal of Communications and Networks
    • /
    • v.16 no.6
    • /
    • pp.667-676
    • /
    • 2014
  • Connectivity is a crucial quality of service measure in wireless sensor networks. However, the network is always at risk of being split into several disconnected components owing to the sensor failures caused by various factors. To handle the connectivity problem, this paper introduces an in-advance mechanism to prevent network partitioning in the initial deployment phase. The approach is implemented in a distributed manner, and every node only needs to know local information of its 1-hop neighbors, which makes the approach scalable to large networks. The goal of the proposed mechanism is twofold. First, critical nodes are locally detected by the critical node detection (CND) algorithm based on the concept of maximal simplicial complex, and backups are arranged to tolerate their failures. Second, under a greedy rule, topological holes within the maximal simplicial complex as another potential risk to the network connectivity are patched step by step. Finally, we demonstrate the effectiveness of the proposed algorithm through simulation experiments.

RECENT ADVANCES IN HEPATOTOXICITY STUDIES

  • Satoh, Tetsuo
    • Toxicological Research
    • /
    • v.7 no.2
    • /
    • pp.113-128
    • /
    • 1991
  • Hepatotoxicity has many facets. Those to be discussed in this review include the mechanism for the hepatotoxic effects, nature of the injury, and animal models of hepatotoxicity suitable for the detection of chemical injury. Some therapeutic drugs used for treatment of hepatitis are also presented. In addition, as an important and serious problem in future, alternative toxicity testing is discussed.

  • PDF